Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6593-1

Ubuntu Security Notice 6593-1 - It was discovered that GnuTLS had a timing side-channel when processing malformed ciphertexts in RSA-PSK ClientKeyExchange. A remote attacker could possibly use this issue to recover sensitive information. It was discovered that GnuTLS incorrectly handled certain certificate chains with a cross-signing loop. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10.

Packet Storm
#vulnerability#ubuntu#dos#ssl

==========================================================================
Ubuntu Security Notice USN-6593-1
January 22, 2024

gnutls28 vulnerabilities

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 23.10
  • Ubuntu 23.04
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in GnuTLS.

Software Description:

  • gnutls28: GNU TLS library

Details:

It was discovered that GnuTLS had a timing side-channel when processing
malformed ciphertexts in RSA-PSK ClientKeyExchange. A remote attacker could
possibly use this issue to recover sensitive information. (CVE-2024-0553)

It was discovered that GnuTLS incorrectly handled certain certificate
chains with a cross-signing loop. A remote attacker could possibly use this
issue to cause GnuTLS to crash, resulting in a denial of service. This
issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10.
(CVE-2024-0567)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10:
libgnutls30 3.8.1-4ubuntu1.2

Ubuntu 23.04:
libgnutls30 3.7.8-5ubuntu1.2

Ubuntu 22.04 LTS:
libgnutls30 3.7.3-4ubuntu1.4

Ubuntu 20.04 LTS:
libgnutls30 3.6.13-2ubuntu1.10

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6593-1
CVE-2024-0553, CVE-2024-0567

Package Information:
https://launchpad.net/ubuntu/+source/gnutls28/3.8.1-4ubuntu1.2
https://launchpad.net/ubuntu/+source/gnutls28/3.7.8-5ubuntu1.2
https://launchpad.net/ubuntu/+source/gnutls28/3.7.3-4ubuntu1.4
https://launchpad.net/ubuntu/+source/gnutls28/3.6.13-2ubuntu1.10

Related news

Red Hat Security Advisory 2024-1082-03

Red Hat Security Advisory 2024-1082-03 - An update for gnutls is now available for Red Hat Enterprise Linux 9.2 Extended Update Support.

Red Hat Security Advisory 2024-0796-03

Red Hat Security Advisory 2024-0796-03 - An update for gnutls is now available for Red Hat Enterprise Linux 8.8 Extended Update Support.

Red Hat Security Advisory 2024-0627-03

Red Hat Security Advisory 2024-0627-03 - An update for gnutls is now available for Red Hat Enterprise Linux 8.

Red Hat Security Advisory 2024-0533-03

Red Hat Security Advisory 2024-0533-03 - An update for gnutls is now available for Red Hat Enterprise Linux 9.

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution